*Question: Can @grpc/grpc-js Support TLS Certificate Validation Using Only 
a Certificate Hash?*
*Context*

In the current implementation of @grpc/grpc-js, creating a secure gRPC 
channel requires providing the full server certificate to 
credentials.createSsl(). However, in dynamic environments (e.g., 
distributed networks with a frequently updated address book), it is common 
to only have access to the hash of the server certificate (e.g., SHA-256). 
Validating the server during the TLS handshake using just the hash is not 
currently supported in the library, which creates challenges for such use 
cases.
*Questions*
   
   1. Is it currently possible to use only a certificate hash to validate a 
   server during the TLS handshake in @grpc/grpc-js?
   2. If not, are there any recommended workarounds for validating a server 
   certificate against a known hash using the existing library features?

*Why This Matters*

Environments with dynamic address books or self-signed certificates often 
only have access to certificate hashes as a trusted source of verification. 
Supporting hash-based validation would:

   - Simplify integration for users in these scenarios.
   - Align with the flexibility of the TLS protocol, which supports 
   certificate signature validation.

-- 
You received this message because you are subscribed to the Google Groups 
"grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to grpc-io+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/grpc-io/33b56a0c-e8b9-4071-b2d1-48962e378f0fn%40googlegroups.com.

Reply via email to